11,971 research outputs found
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.Comment: 10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.42
Coolant side heat transfer with rotation: User manual for 3D-TEACH with rotation
This program solves the governing transport equations in Reynolds average form for the flow of a 3-D, steady state, viscous, heat conducting, multiple species, single phase, Newtonian fluid with combustion. The governing partial differential equations are solved in physical variables in either a Cartesian or cylindrical coordinate system. The effects of rotation on the momentum and enthalpy calculations modeled in Cartesian coordinates are examined. The flow of the fluid should be confined and subsonic with a maximum Mach number no larger than 0.5. This manual describes the operating procedures and input details for executing a 3D-TEACH computation
Recommended from our members
Spatial characteristics of thunderstorm rainfall fields and their relation to runoff
The main aim of this study was to assess the ability of simple geometric measures of thunderstorm rainfall in explaining the runoff response from the watershed. For calculation of storm geometric properties (e.g. areal coverage of storm, areal coverage of the high-intensity portion of the storm, position of storm centroid and the movement of storm centroid in time), spatial information of rainfall is needed. However, generally the rainfall data consists of rainfall depth values over an unevenly spaced network of raingauges. For this study, rainfall depth values were available for 91 raingauges in a watershed of about 148 km2. There was a question about which interpolation method should be used for obtaining uniformly gridded data. Therefore, a small study was undertaken to compare cross-validation statistics and computed geometric parameters using two interpolation methods (kriging and multiquadric). These interpolation methods were used to estimate precipitation over a uniform 100 m × 100 m grid. The cross-validation results from the two methods were generally similar and neither method consistently performed better than the other did. In view of these results we decided to use multiquadric interpolation method for the rest of the study. Several geometric measures were then computed from interpolated surfaces for about 300 storm events occurring in a 17-year period. The correlation of these computed measures with basin runoff were then observed in an attempt to assess their relative importance in basin runoff response. It was observed that the majority of the storms (observed in the study) covered the entire watershed. Therefore, it was concluded that the areal coverage of storm was not a good indicator of the amount of runoff produced. The areal coverage of the storm core (10-min intensity greater than 25 mm/h), however, was found to be a much better predictor of runoff volume and peak rate. The most important variable in runoff production was found to be the volume of the storm core. It was also observed that the position of the storm core relative to the watershed outlet becomes more important as the catchment size increases, with storms positioned in the central portion of the watershed producing more runoff than those positioned near the outlet or near the head of the watershed. This observation indicates the importance of interaction of catchment size and shape with the spatial storm structure in runoff generation. Antecedent channel wetness was found to be of some importance in explaining runoff for the largest of the three watersheds studied but antecedent watershed wetness did not appreciably contributed to runoff explanation. © 2002 Elsevier Science B.V. All rights reserved
Recommended from our members
A survey of fuzzy rule-based image segmentation techniques
This paper describes the various fuzzy rule based techniques for image segmentation. Fuzzy rule based segmentation techniques can incorporate domain expert knowledge and manipulate numerical as well as linguistic data. They are also capable of drawing partial inference using fuzzy IF-THEN rules. For these reasons they have been extensively applied in medical imaging. But these rules are application domain specific and it is very difficult to define the rules either manually or automatically so that the segementation can be achieved successfully
- …